BikramshahiOSI MODEL:OSI stands for “Open System Interconnection Model”. It is a conceptual framework used to describe the function of a networking system.The…Mar 14, 2022Mar 14, 2022
BikramshahiAccess Control Vulnerabilities:Access control is the security techniques who or what can view or use resources in a computing environment.Access control is dependent on…Mar 10, 2022Mar 10, 2022
BikramshahiXML External Entity Attacks in JAVA:XML External Entity Attacks allows a mallicious user to read arbitrary files on your server by taking an advantages of an unsecured XML…Mar 6, 2022Mar 6, 2022
BikramshahiRouting Information Protocol(RIP):It is a vector routing protocol that uses the hop count as the routing unit for finding the most suitable path between the source and the…Mar 6, 2022Mar 6, 2022
BikramshahiOpen Shortest Path First(OSPF):It is widely used and supported routing protocol. It is an intradomain protocol , that means is is used within an area or network.It is an…Mar 4, 2022Mar 4, 2022
BikramshahiNetwork Address Translation(NAT):NAT stands for network address translation. It’s a way to map multiple local private addresses to a public one before transferring the…Mar 3, 2022Mar 3, 2022
BikramshahiPORT ADDRESS TRANSLATION(PAT):Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network…Mar 3, 2022Mar 3, 2022